Gibson> Download Garbage
search
⌘Ctrlk
Gibson> Download Garbage
  • Statement of purpose
  • Techniques
    • Intelligence Gathering
    • Initial Access
    • Execution
    • Privilege Escalation
    • Defense Evasion
    • Credential Access
    • Infrastructure
    • Web application testing
    • Other
    • Red Team Infrastructure
    • Malware
    • Automation
  • Tools
    • Tools
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Techniques

Malware

TBC - Just some handy reference links for now

hashtag
Template functions

LogoUACME/Source/Shared at master · hfiref0x/UACMEGitHubchevron-right
LogoGitHub - vxunderground/VX-API: Collection of various malicious functionality to aid in malware developmentGitHubchevron-right
LogoGitHub - TheAlgorithms/C-Plus-Plus: Collection of various algorithms in mathematics, machine learning, computer science and physics implemented in C++ for educational purposes.GitHubchevron-right
LogoGitHub - TheAlgorithms/C: Collection of various algorithms in mathematics, machine learning, computer science, physics, etc implemented in C for educational purposes.GitHubchevron-right

hashtag
Technique examples

LogoGitHub - skahwah/encrypt: Pseudorandom AES-256 encryption designed to protect shellcode and arbitrary strings. C# and C/C++ compatible.GitHubchevron-right
LogoVXUG-Papers/Hells Gate at main · vxunderground/VXUG-PapersGitHubchevron-right

hashtag
Malware examples

LogoGitHub - rad9800/WTSRM: WTSRMGitHubchevron-right
LogoGitHub - Allevon412/TeamsImplantGitHubchevron-right
LogoGitHub - joshfaust/Alaris: A protective and Low Level Shellcode Loader that defeats modern EDR systems.GitHubchevron-right
PreviousGophish Docker reverse proxychevron-leftNextAutomationchevron-right

Last updated 3 years ago

Was this helpful?

  • Template functions
  • Technique examples
  • Malware examples

Was this helpful?